首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   670篇
  免费   142篇
  国内免费   38篇
  850篇
  2024年   4篇
  2023年   3篇
  2022年   3篇
  2021年   23篇
  2020年   15篇
  2019年   38篇
  2018年   39篇
  2017年   49篇
  2016年   40篇
  2015年   28篇
  2014年   75篇
  2013年   108篇
  2012年   28篇
  2011年   39篇
  2010年   49篇
  2009年   48篇
  2008年   48篇
  2007年   42篇
  2006年   38篇
  2005年   30篇
  2004年   19篇
  2003年   19篇
  2002年   9篇
  2001年   7篇
  2000年   11篇
  1999年   6篇
  1998年   4篇
  1997年   6篇
  1996年   5篇
  1995年   5篇
  1994年   4篇
  1993年   1篇
  1992年   3篇
  1991年   2篇
  1990年   2篇
排序方式: 共有850条查询结果,搜索用时 15 毫秒
71.
There were several high-profile violent incidents in 2011 in Kazakhstan, including several bombings, shootings that targeted police, and a protest turned clash that resulted in a number of deaths. Some of the perpetrators reportedly had links with radical religious groups. An overlooked aspect of the violence is how it is reported in Kazakhstan. There are active, competent media in Kazakhstan, which are largely unknown in the West. An examination of these incidents using the media in Kazakhstan can provide a unique insight into what took place. While Western sources quickly blamed radical religious groups with international connections, media in Kazakhstan have found that there are other reasons for the violence.  相似文献   
72.
提出了一种新的三粒子量子安全直接通信协议。通信过程利用decoy光子来检测窃听,保证信道安全。发送方将秘密消息编码在不同幺正操作上,通信双方通过Bell基和Z基测量可直接传递秘密消息。由于所有粒子都用于传输秘密消息,且传输一次可获得两比特信息,该协议具有较高的量子比特及量子密码协议效率;三粒子纠缠态的制备是已实现技术,该协议具有实际操作的意义。此外,该协议在量子信道中也是安全的。  相似文献   
73.
As part of a bio-inspired design process, the authors examine exoskeletal sensors found in insects and their potential application to armor and hardened buildings. In this way, the outer hardening of a structure or vehicle would not limit the ability of occupants to arrive at an actionable picture of the outer environment. To this end, various sensor modalities employed by insects are compared and contrasted with their current human-engineered equivalents. In several sensing modalities, biosensors perform better, are smaller, and more energy efficient than human-engineered equivalents. They note that biological designs tend to employ non-linear response to signal amplitude and respond with heightened sensitivity over a greater dynamic range of signals than human-engineered sensors. The insect biological sensors have structural and mechanical innovations that preserve the protective capacity of the exoskeleton.  相似文献   
74.
针对反导导弹战斗部的性能特点,以灰色关联理论为基础,采用灰色加权关联度分析进行综合评判,建立了反导导弹战斗部作战效能评估模型.最后通过算例,验证了该模型的完整性,最终为决策者做出合理的作战决策提供了理论参考.  相似文献   
75.
针对我军后方仓库弹药装卸运输环节对人员叉车操作的安全性需求,设计出了叉车操作测试场地路线,归纳总结了人员操作叉车进行弹药装卸运输环节中的安全失效形式及失效原因,构建了HRA评估数学模型.选取我军某后方仓库搬运机械建制班人员为对象,进行了实地测试,得到了弹药装卸运输环节的人为失误概率.测试结果表明,基于CREAM方法能够较好地解决后方仓库弹药装卸运输环节人为失误概率的量化问题.  相似文献   
76.
Abstract

Pastoralist groups in Eastern Africa are extremely vulnerable as a result of inter-community conflicts, the harsh terrain, and unfavourable climatic conditions. They have been neglected by successive regimes on matters of socio-economic development. At present pastoralist areas in Eastern Africa have the lowest literacy rates and insufficient health care facilities. This article interrogates the historical relationship between governments, humanitarian groups and pastoralists. It notes with great concern that pastoralists have been branded as hunger-stricken populations with insignificant economic potential that can be harnessed from their day-to-day livelihood. They are treated as sedentary populations who need a constant supply of relief food to keep going. In order to reverse these misconceptions, the article places emphasis on mitigating the threats of intra-community conflicts, diseases and natural disasters through investment in social schemes and infrastructure in order to open up the areas for service provision. Indeed, for a majority of the pastoralists, insecurity comes not so much from traditional security concerns, but from human insecurity concerns about their survival, preservation of their lifestyle and well-being in a day-to-day context.  相似文献   
77.
After only ten years in existence, the African Union (AU) has already made its mark on the landscape of peace and security in Africa. This paper seeks to explore the relationship between the AU's leading collaborative interstate security policy, the African Peace and Security Architecture (APSA), and sustainable peace in the Horn of Africa. It examines four countries – Djibouti, Eritrea, Ethiopia, and Kenya – and how engaging with the APSA through early warning systems can contribute to developing the elements necessary for sustainable peace, namely regional stability, conflict management, and good governance.  相似文献   
78.
SADC has a poor record in advancing peace and security in Southern Africa. Many identify poor policy frameworks and weak technical capacities as the major obstacles. Laurie Nathan goes beyond these easy explanations in his important new book on SADC. Absence of common democratic values and reluctance to surrender state sovereignty are key factors preventing SADC from making progress according to this book. This article argues that Nathan overstates the case and that there are real prospects and potentials for making further progress in regional cooperation. The lessons from the history of European integration also points to the important role of regional leadership. South Africa, in coalition with other likeminded countries, may still be in a position to move the SADC project forward.  相似文献   
79.
ABSTRACT

The Kingdom of Lesotho spends around five per cent of its annual budget – some 700 million Maloti ($US52.6 million) in 2017 – on the Lesotho Defence Force (LDF). Lesotho’s geographical position means that the LDF has no meaningful role regarding its primary function of defending the country from external aggression and it hardly engages in its secondary functions. In addition, the LDF has a long history of interference with democratic processes and engaging in human rights abuse. The financial resources currently allocated to the LDF could do far more for security, widely defined, if they were allocated to a number of other government expenditure categories.  相似文献   
80.
Standard economic concepts of production and cost minimization subject to a production constraint are used to derive the conditions of optimal deployment of home and forward military forces for the production of home security. United States' participation in the NATO alliance is then analyzed in the context of a two‐ally (U.S. and Western Europe) optimal force deployment model of NATO. Next, U.S. force‐basing policy is adduced as an enforcement mechanism for the “transatlantic contract.” Lastly, statistical evidence on burden sharing within Western Europe, and the effectiveness of the U.S. contract enforcement policy, is presented.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号